March Patch Tuesday: 84 CVEs Fixed

Your everyday Windows rig? Probably fine. But if you're knee-deep in Microsoft’s back-end services like Payment Orchestrator, this Patch Tuesday just saved your bacon—or exposed how bloated the empire’s gotten.

Microsoft's March Patch Bonanza: 84 Holes Plugged, But Obscure Gear Takes the Hits — theAIcatchup

Key Takeaways

  • 84 patches across 15 families, 8 Critical but none in core Windows.
  • Elevation of Privilege bugs lead (46 total), signaling deep ecosystem issues.
  • Patch obscure services like Payment Orchestrator fast—no exploits yet, but risk looms.

If you’re an average Joe firing up Excel or browsing in Edge, March Patch Tuesday won’t keep you up at night. But dive into the enterprise swamp—think Azure admins or channel partners fiddling with pricing programs—and suddenly 84 patches across 15 product families feel like a wake-up call. Real people? Sysadmins sweating over unpatched Payment Orchestrator Service, that’s who. One wrong move, and attackers climb privileges like it’s a Silicon Valley ladder.

Look, I’ve covered these monthly Microsoft ritual for two decades. Buzzword-free truth: this drop’s no apocalypse. Eight Criticals, sure, but zero hit Windows proper. None exploited in the wild. Still, 22 with CVSS 8.0-plus? That’s not chump change.

Why March Patch Tuesday Matters More Than You Think

Elevation of Privilege bugs dominate again—46 of ‘em, half the total impact types. Figure that: attackers love escalating rights without breaking a sweat. Windows Server variants snag 45 CVEs alone (see their Appendix E breakdown). And those obscure ones? Microsoft Devices Pricing Program—channel partners’ nightmare—got a Critical fix pre-Patch Tuesday. Payment Orchestrator Service too. Microsoft’s already patching shadows we didn’t know lurked.

Here’s the quote that nails it from Microsoft’s advisory on one nasty Office RCE:

An attacker who successfully exploited this vulnerability could potentially cause Copilot Agent mode to exfiltrate data via unintended network egress, enabling zero-click information disclosure attacks.

Zero-click. In Excel preview pane. That’s the stuff that turns ‘important’ into ‘oh crap.’

But wait—five Criticals were pre-patched. Transparency play? Or quiet panic? Cynic that I am, smells like Microsoft’s empire bloat biting back. Who’s making money here? The obscure services propped up by endless subscriptions, that’s who. Patch ‘em or pay later.

Is Your Setup Actually Vulnerable?

Short answer: depends on your stack. Windows bugs? Just over half the 84 total. Office trio stands out: CVE-2026-26110, CVE-2026-26113 (both preview pane RCEs in 365/Office/SharePoint), and CVE-2026-26144 (Excel info leak, Copilot twist). No direct Excel hit on the last, oddly—Microsoft’s CVE naming’s a mess sometimes.

Then CVE-2026-23660: Windows Admin Center in Azure Portal EoP. Gotta hunt it down in Extensions blade. Specific? Yeah. Annoying for rushed admins? Absolutely.

CVE-2026-26123 in Authenticator: Info disclosure if you tap a bad app on QR scan. User error city.

Sophos flags some for direct detection—good if you’re in their orbit. Six CVEs pegged for likely 30-day exploits. Publicly disclosed: two. No wild exploits yet.

My unique take? This Elevation of Privilege plague—half of 2026’s 255 Patch Tuesday CVEs so far—echoes Windows NT days. Back then, privilege rings were leaky by design. Microsoft’s layered defenses haven’t fixed root rot; they’re just papering cracks. Bold call: by summer, we’ll see niche service exploits chaining these EoPs into real breaches. History rhymes, folks.

The Numbers Don’t Lie—Or Do They?

Total CVEs: 84. Critical: 8 (zero Windows). Important: 76. Breakdown? RCE:17, EoP:46, Info Disclosure:10, DoS:4, Spoofing:4, Bypass:3. One 9.8 CVSS monster.

Obscure families pad the list—counted per product if overlapping. Office CVEs name-drop apps not always affected. Sloppy.

Quarter into 2026, Crits are rare in regular patches (21 total). But volume screams maintenance mode, not innovation.

Patch fast. Auto-updates save lives—or at least data. Enterprises: Appendix A by severity, B by exploit risk/CVSS, C by family, D for Edge/Adobe/Semantic Kernel, E for Servers. Your homework.

Who’s Profiting from the Patch Treadmill?

Silicon Valley’s wet dream: endless vulns fueling update cycles. Microsoft? Subscriptions hum along. Attackers? Toolkits for EoPs sell on dark web. Us users? Stuck playing whack-a-mole.

Hate to say it, but this feels like corporate hygiene, not heroism. Pre-patching Criticals in shadows? Smart, but why so many shadows?

Real people win if they patch. Lose if they snooze on niche gear.


🧬 Related Insights

Frequently Asked Questions

What CVEs were fixed in March Patch Tuesday?

84 total, including 8 Criticals in non-Windows products like Office and obscure services. Key ones: Office RCEs (CVE-2026-26110, -26113), Excel leak (CVE-2026-26144).

Are there exploited vulnerabilities in March Patch Tuesday?

None detected in the wild. Six flagged for likely 30-day exploit risk.

Does March Patch Tuesday affect Windows?

Over half the CVEs hit Windows flavors, but no Criticals or active exploits there. Servers get 45 fixes.

Aisha Patel
Written by

Former ML engineer turned writer. Covers computer vision and robotics with a practitioner perspective.

Frequently asked questions

What CVEs were fixed in March Patch Tuesday?
84 total, including 8 Criticals in non-Windows products like Office and obscure services. Key ones: Office RCEs (CVE-2026-26110, -26113), Excel leak (CVE-2026-26144).
Are there exploited vulnerabilities in March Patch Tuesday?
None detected in the wild. Six flagged for likely 30-day exploit risk.
Does March Patch Tuesday affect Windows?
Over half the CVEs hit Windows flavors, but no Criticals or active exploits there. Servers get 45 fixes.

Worth sharing?

Get the best AI stories of the week in your inbox — no noise, no spam.

Originally reported by Sophos Threat Research

Stay in the loop

The week's most important stories from theAIcatchup, delivered once a week.